Bug 1456712 (CVE-2017-9287)

Summary: CVE-2017-9287 openldap: Double free vulnerability in servers/slapd/back-mdb/search.c
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: csutherl, dandread, gzaronik, huwang, jclere, jsynacek, lgao, mbabacek, mhonek, myarboro, pkis, rmeggins, slawomir, twalsh, weli, yozone
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A double-free flaw was found in the way OpenLDAP's slapd server using the MDB backend handled LDAP searches. A remote attacker with access to search the directory could potentially use this flaw to crash slapd by issuing a specially crafted LDAP search query.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:13:37 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1456713, 1458210    
Bug Blocks: 1456714    

Description Adam Mariš 2017-05-30 08:18:22 UTC
servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a double free vulnerability. A user with access to search the directory can crash slapd by issuing a search including the Paged Results control with a page size of 0.

Upstream patch:

https://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=0cee1ffb6021b1aae3fcc9581699da1c85a6dd6e

Comment 1 Adam Mariš 2017-05-30 08:18:51 UTC
Created openldap tracking bugs for this issue:

Affects: fedora-all [bug 1456713]

Comment 7 Dhiru Kholia 2017-06-05 12:41:01 UTC
External References:

http://www.openldap.org/its/?findid=8655

Comment 10 Dhiru Kholia 2017-06-06 11:33:12 UTC
Statement:

This issue does not affect the versions of OpenLDAP as shipped with Red Hat Enterprise Linux 6 and 7 as they don't use the affected MDB backend in their default configurations. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Comment 12 errata-xmlrpc 2017-08-01 20:19:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1852 https://access.redhat.com/errata/RHSA-2017:1852